← Volver a CVEs
CVE-2017-3222
CRITICAL9.8
Descripcion
Hard-coded credentials in AmosConnect 8 allow remote attackers to gain full administrative privileges, including the ability to execute commands on the Microsoft Windows host platform with SYSTEM privileges by abusing AmosConnect Task Manager.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado7/22/2017
Ultima modificacion4/20/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
inmarsat:amosconnect
Debilidades (CWE)
CWE-798CWE-798
Referencias
http://www.securityfocus.com/bid/99899(cret@cert.org)
https://twitter.com/mkolsek/status/923988845783322625(cret@cert.org)
https://www.kb.cert.org/vuls/id/586501(cret@cert.org)
http://www.inmarsat.com/news/inmarsat-response-to-ioactive-claims/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/99899(af854a3a-2127-422b-91ae-364da2661108)
https://twitter.com/mkolsek/status/923988845783322625(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/586501(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.